DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

REvil ransomware’s servers reappear without fanfare or explanation

Posted on September 8, 2021 by Dissent

Brett Callow of Emsisoft broke the unpleasant news on Twitter last night — REvil’s dedicated leak site, “The Happy Blog,” which had disappeared after the Kaseya supply chain attack, had reappeared at its old onion address. Unfortunately, the Happy Blog is back online #REvil pic.twitter.com/vMr9qTOht2 — Brett Callow (@BrettCallow) September 7, 2021 There were no…

Read more

Afghanistan becomes the primary target for ransomware attacks following Taliban takeover

Posted on September 8, 2021 by Dissent

Paul Skeldon reports; The recent Taliban takeover of the government in Afghanistan has brought a lot of chaos upon the nation – and cybercriminals are seeing that such disorder in the country is another chance for them to benefit. According to the Atlas VPN team data analysis, Afghanistan became the primary target for ransomware attacks worldwide in…

Read more

Microsoft Outlook shows real person’s contact info for IDN phishing emails

Posted on September 8, 2021 by Dissent

Ax Sharma reports: If you receive an email from someone@arstechnіca.com, is it really from someone at Ars? Most definitely not—the domain in that email address is not the same arstechnica.com that you know. The ‘і’ character in there is from the Cyrillic script and not the Latin alphabet. This isn’t a novel problem, either. Up until a few…

Read more

North Korean hackers breach prominent defector’s accounts in targeted attack

Posted on September 7, 2021 by Dissent

Jeongmin Kim and Nils Weisensee report: In a multilingual social engineering attack, North Korean hackers broke into several accounts of a prominent defector and used their access to send a malicious document to a contact working on DPRK issues, an NK News investigation found. The attackers also used one of the accounts to message journalists at NK News in…

Read more

Chinese hackers behind July 2021 SolarWinds zero-day attacks

Posted on September 6, 2021 by Dissent

Catalin Cimpanu reports: In mid-July this year, Texas-based software provider SolarWinds released an emergency security update to patch a zero-day in its Serv-U file transferring technology that was being exploited in the wild. At the time, SolarWinds did not share any details about the attacks and only said that it learned of the bug from…

Read more

NC: Sandhills Center Provides Notice of Potential Data Theft

Posted on September 4, 2021 by Dissent

On July 30, 2021, DataBreaches.net reported on a claimed cyberattack against Sandhills Center in North Carolina. Data for sale had shown up on the “Marketo” site, and when DataBreaches.net looked at the “proof packs,” of data, they included psychological evaluations and other documents with personal and sensitive information.  Much of the data was old, and…

Read more
  • Previous
  • 1
  • …
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • …
  • 872
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information
  • FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters
  • Dutch police identify users on Cracked.io

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe
  • AI tools collect and store data about you from all your devices – here’s how to be aware of what you’re revealing
  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale
  • The Meta AI app is a privacy disaster – TechCrunch

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.